Movatterモバイル変換


[0]ホーム

URL:


US6987853B2 - Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess - Google Patents

Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess
Download PDF

Info

Publication number
US6987853B2
US6987853B2US09/725,786US72578600AUS6987853B2US 6987853 B2US6987853 B2US 6987853B2US 72578600 AUS72578600 AUS 72578600AUS 6987853 B2US6987853 B2US 6987853B2
Authority
US
United States
Prior art keywords
character
type
generating
key
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US09/725,786
Other versions
US20020064279A1 (en
Inventor
Eric R. Uner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bodacion Tech LLC
Original Assignee
Bodacion Tech LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bodacion Tech LLCfiledCriticalBodacion Tech LLC
Priority to US09/725,786priorityCriticalpatent/US6987853B2/en
Assigned to VIRTUAL MEDIA, INC.reassignmentVIRTUAL MEDIA, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: UNER, ERIC R.
Priority to PCT/US2001/051137prioritypatent/WO2002058320A1/en
Priority to AU2002241778Aprioritypatent/AU2002241778A1/en
Publication of US20020064279A1publicationCriticalpatent/US20020064279A1/en
Assigned to BODACION TECHNOLOGIES, LLCreassignmentBODACION TECHNOLOGIES, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: VIRTUAL MEDIA, INC.
Application grantedgrantedCritical
Publication of US6987853B2publicationCriticalpatent/US6987853B2/en
Adjusted expirationlegal-statusCritical
Expired - Fee Relatedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method and apparatus for generating a group of non-repetitive, difficult-to-guess character sets is disclosed. The method includes (a) generating a request for a character set by a client of a character-generating server, (b) sending the request to the character-generating server, (c) generating a pseudo random number required by the character generator; (d) sending the pseudo random number to the character generator; (e) generating a character for the character set by the character generator, (f) sending the character set along with a related key to the client; (g) sending the character set along with the related key to a target server, (h) sending related key to the character-generating server by the target server; (i) re-creating the character set from the related key by the target server; and (j) sending the character set along with the related key to the target server.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to data generating method and apparatus. More specifically, my invention is primarily intended for generating random character sets which are both never repeating within certain period of time and difficult to guess.
2. Description of the Prior Art
Computers and the Internet have become a most significant part of modem communication. Remote access to data has become the essence of the Internet. In order to restrict access to data to authorized users and authorized users only, a lot of securities measure have been put into place. One of the most commonly used methods to secure data is to add a key to the data. The key performs two functions. One is to limit access to data to certain authorized users; the other is to keep track of the access to data by authorized users.
Various inventions have been made to generate these keys. U.S. Pat. No. 4,255,811, which issued to Adler, discloses a Key Controlled Block Cipher Cryptographic System. This invention provides a cryptographic system for encrypting a block of binary data under the control of a key consisting of a set of binary symbols. The cryptographic system may be utilized within a data processing environment to ensure complete privacy of data and information that is stored or processed within a computing system. All authorized subscribers who are permitted access to data within the network are assigned a unique key consisting of a combination of binary symbols. The central processing unit within the computing network contains a complete listing of all distributed authorized subscriber keys. All communications transmitted from terminal input are encrypted into a block cipher by use of the cryptographic system operating under the control of the subscriber key which is inputted to the terminal device. At the receiving station or central processing unit, an identical subscriber key which is obtained from internal tables stored within the computing system is used to decipher all received ciphered communications. It is a primary object of this invention to provide a cryptographic method and apparatus capable of maintaining a high degree of secrecy during the transmission or storage of binary data. It is a further object of the invention to provide such a cryptographic method and apparatus particularly suitable for use in information handling systems such as an electronic digital computer. It is a still further object of the invention to provide such a cryptographic method and apparatus which produces enciphered binary data blocks into a cipher text that is not susceptible to breaking by known cryptanalysis methods. It is another object of the invention to provide such a method and apparatus that operates on a block of data by developing a product cipher dependent upon a unique key which is known only to authorized users and to the system. It is a still further object of this invention to provide such a method and apparatus capable of enciphering a clear text message by means of a product cipher of successive blocks of said message, each product cipher comprising a plurality of linear and affined transformations which are a function of a unique subscriber key configuration, wherein each transformation utilizes a key input which is itself a subset or function of said key and further including a unique nonlinear transformation comprising addition-with-carry of a partially enciphered or deciphered block of data under control of said subscriber key. It is a further object of this invention to provide such a cryptographic system capable of maintaining privacy between any transmitting and receiving station in a communications network or between a plurality of terminals and a central processor including data banks of a computer system. It is yet another object of the invention to provide such a method and apparatus which may be utilized for both encryption and decryption with very slight modification.
U.S. Pat. No. 5,349,642, which issued to Kingdon, discloses a Method and Apparatus for Authentication of Client Server Communication. This invention provides a method and apparatus for message packet authentication to prevent the forging of message packets. After a message packet is created, a secret session key is preappended to the message, and a message digesting algorithm is executed on the altered message to create a message digest. A portion of the message digest, referred to as the signature, is then appended to the actual message when it is sent over the wire. The receiving station strips the signature from the message, preappends the same secret session key and creates its own message digest. The signature of the digest created by the receiving station is compared to the signature of the digest appended by the sending station. If there is a match, an authentic message is assumed. If there is no match, the message is considered as invalid and discarded. An advantage of this invention is that the session key is never transmitted over the wire. The receiving station (server) already has the key and uses the key along with the message data to recalculate the message digest upon receiving the packet. The shared secret key (session key) is generated during initiation of the NCP session. In addition, cumulative state information is maintained by both the sending station and the receiving station. This state information is also used to authenticate messages.
U.S. Pat. No. 5,633,931, which issued to Wright, discloses a Method and Apparatus for Calculating Message Signatures in Advance. This invention provides a method and apparatus for authenticating a message transmitted from a sender to a receiver, where the message is a response to a prior communication from the receiver to the sender, comprising the following steps. First, the sender generates a message signature at least partially derived from a message and a code held by both the sender and receiver. Second, the sender creates an appended message by combining the message signature to the message. Third, the sender sends the appended message to the receiver. Fourth, prior to receiving the message signature and message from the sender, the receiver generates a predicted message signature that is at least partially derived from an expected message from the sender to the receiver and a code held by both the sender and receiver. Fifth, the receiver receives the appended message transmitted by the sender. Sixth, the receiver compares the predicted message signature with the received message signature. Lastly, the receiver authenticates the message it received if the predicted message signature and the received message signature match. An object of this invention is to provide an improved means for preventing message packet forgery. Another object of this invention is to provide an improved message packet authentication means for preventing message packet forgery. Yet another object of this invention is to provide an improved message packet authentication means for preventing message packet forgery that reduces message authentication time. A further object of this invention is to provide an improved message packet authentication means for preventing message packet forgery that reduces overall message transaction time.
U.S. Pat. No. 5,892,827, which issued to Beach, discloses a Method and Apparatus for Generating Personal Identification Numbers for Use in Consumer Transactions. This invention resides in a method for assuring security of individually identifiable randomly numbered certificates is accomplished by printing an encoded self-validating PIN on each certificate. An encryption method permits the PIN to be deciphered when it is presented for redemption. The method enables a greater number of potential personal identification numbers, in the form of PINs, to be generated from a limited or fixed number of digits. The method includes the printing of an authorization code on the certificate, which code will subsequently be used to verify the validity of the award. Preferably, the method includes the generation, in real time at the point-of-sale in a retail store, of seemingly random authorization codes which will be subsequently used to verify the validity of the award as well as to provide information pertaining to the location of the printing of the authorization code on the certificate, which will also be subsequently used to verify the validity of the award. Briefly, and in general terns, the method of the invention comprises the steps of detecting the occurrence of an event that has been preselected to trigger the generation of a certificate of value for distribution to a customer of a retail store; generating a certificate of value in response to the detecting step; generating a unique and seemingly random authorization code at about the same time that the certificate is generated; and including the authorization code in the certificate. The certificate is self-validating and has no existence or value prior to its generation and there is, therefore, no requirement to keep an inventory of either certificates or authorization codes before their generation.
U.S. Pat. No. 5,913,217, which issued to Alger, discloses a Generating and Compressing Universally Unique Identifiers (UUIDS) Using Counter Having High-Order Bit to Low-Order Bit. This invention provides a computer-based method and system that reduces the overhead of storing object identifiers and reduces the chance of duplicate object identifiers being generated. The system generates counter-based identifiers rather than OSF-defined identifiers. To generate an identifier, the system increments a counter having bits that are ordered from a high-order bit to a low-order bit. The system sets a computer system identifier portion of contiguous bits of the identifier to identify the computer system that is generating the identifier. The system also sets a counter portion of contiguous bits of the identifier to the bits of the incremented counter. The system sets the bits of counter portion so that the bits of the counter portion that are closer to the bits of the computer system identifier portion are set to the higher-order bits of the counter. The counter-based object identifier has the advantage of being more efficiently compressed than the OSF-defined format. For example, since the high-order bits of the counter portion are closer to the node identifier portion, for object identifiers generated at the same computer system, the amount of contiguous information in two object identifiers that is redundant is increased. Compression techniques can reduce storage overhead by efficiently storing the redundant information. The system compresses a list of universally unique identifiers (UUIDs) by compactly representing redundant portions of the UUIDs. The system determines which portion of a selected UUID is redundant with a portion of a previously selected UUID. The system compresses a UUID by storing an indication of the portion of the selected UUID that is redundant and storing a remainder of the selected UUID that is not indicated as being redundant. When the redundant portions are contiguous and form either the prefix or the suffix of the UUIDs, one of many well known prefix or suffix compression algorithms can be used. In another aspect of this invention, the system compresses an object identifier by replacing a portion of the identifier with a short handle that specifies the bit that it replaces. The system generates a mapping of handles to values of a portion of object identifiers. To compress an object identifier, the system determines whether the value corresponding to the portion of the object identifier is in the generated mapping. When the value corresponding to the portion of the object identifier is in the generated mapping, the system sets a compressed form of the object identifier to a combination of the handle that maps to that value and of the remainder of the object identifier other than the value. To decompress a compressed object identifier, the system uses the handle to retrieve the bits for the portion from the mapping and adds the remainder.
U.S. Pat. No. 5,915,021, which issued to Herlin, discloses a Method for Secure Communications in a Telecommunications System. This invention provides a method for sending a secure message in a telecommunications system utilizing public encryption keys. All authentication parameters of each of the users, including each user's decryption key that is known only to the user, are used to verify, by public key methods, the identity of a user sending a communication to another user of the system. During the authentication process, an encryption key for use in communications between the two users may also be generated. The generated encryption key may be a private session key. Once the initial authentication is completed, the private session key can be used to perform encryption that is less computationally demanding than public key methods. In an embodiment of the invention, two communicating users may use the method to authenticate each other and generate an encryption key that is used to encrypt subsequent communications between the users. During the process of this embodiment, two encryption keys are generated. A first encryption key is used only in the authentication process, and, a second encryption key is used in both the authentication process and as the key for encrypting subsequent communications. Use of two encryption keys requires that each of the two users apply its decryption key to complete the authentication and encryption key agreement process successfully.
U.S. Pat. No. 5,963,646, which issued to Fielder, discloses a Secure Deterministic Encryption Key Generator System and Method. A method and system is disclosed for generating a deterministic but non-predictable symmetric encryption key which is highly resistant to cryptographic analysis or brute force attacks to discover the E-Key Seed of the encryption key generator. More particularly, the bits of a constant value or message are logically, cryptographically and/or algebraically combined with the bits of a secret plural bit sequence (E-Key Seed) to provide a bit-shuffling which results in the mapping of a large number of bits into a first pseudo-random number having fewer bits. The resulting bit sequence then is applied through a secure hash function for increased irreversibility. The message digest in turn may be truncated to a desired bit length to provide a repeatable, non-predictable but deterministic, and pseudo-random symmetric encryption key. In one aspect of the invention, the encryption key produced by the encryption key generator may be reproduced by applying same inputs to the generator. The need for key directories or key records thereby is obviated. In another aspect of the invention, attempts to discover the E-Key Seed of the encryption key generator through cryptographic analysis or brute force attacks is thwarted by having one input, the secret E-Key Seed, held in secret and consisting of a plural bit sequence of at least 224 bits, by algebraically combining the bits of the E-Key Seed and the constant value to provide a many-to-few bit mapping result as a pseudo-random input to the secure hash algorithm, and by applying the combination through a secure hash function which enhances the irreversibility of the pseudo-random encryption key output. In still another aspect of the invention, the E-Key Seed and constant value may be combined through a sequence of logic, algebraic, and/or cryptographic steps to provide an input to the secure hash function. In a further aspect of the invention, the E-Key Seed and constant value may be encrypted to provide an input to the secure hash function.
U.S. Pat. No. 5,982,892, which issued to Hicks, discloses a System and Method for Remote Authorization for Unlocking Electronic Data. The main components of the system of this invention include a product key generator, a user key generator, and a user key verifier. The product key generator is responsible for generating a signing key or keys, and a verification key or keys. The user key generator generates a unique user key(s) using a numeric representation(s) of identifying information relating to a user; such identifying information optionally may include licensing information containing terms of permitted use and the signing key(s). The user key verifier determines whether the user key matches the identifying information as a means for controlling the use mode of the software. This use of digital signatures to generate user keys is both novel and nonobvious over the prior art. This invention also includes a method for controlling unauthorized use of software distributed by a software vendor. The method begins by generating a verification key with a product key generator. The verification key includes a private signing key and a public verification key. The software and the verification key are combined to create distributable software which is distributed to a user. The user installs the software on a user computer system as protected software. To obtain a user key, the user inputs user identifying information which is sent to a user key generator. The user identifying information may include licensing information as well as information on the user, the user's computer system, etc. The user key generator converts the user identifying information to a numeric representation and then generates, by signing the numeric representation with the private signing key, a user key. The user key is conveyed to the user computer system. Using the verification key, a user key verifier verifies a relationship between the user key and the user identifying information to determine an access level to the protected software. A general object of the invention is software that executes a user key verifier at run-time to determine run-state as a means of protecting the software from unauthorized use. Another object of the invention is a user key verifier that uses a public key signature verification algorithm to determine the validity of a user key. An additional object of the invention is the use of digital signatures to generate user keys in a system for controlling unauthorized use of software distributed to users. A further object of the invention is a system using the presence of a valid digital signature on licensing information to determine a program's mode of execution.
U.S. Pat. No. 6,064,989, which issued to Cordery, discloses a Synchronization of Cryptographic Keys between Two Modules of a Distributed System. The invention provides an apparatus for synchronizing cryptographic keys. The apparatus comprises: a first module including a universal key; a second module including a unique identifier and a unique key wherein the unique key is derived from the unique identifier and the universal key and incorporated into the second module during manufacture of the second module. The second module is in communication with the first module. The apparatus further comprises a controller for performing the following subsequent to manufacture of the first module and the second module: initiating a communication session between the first module and the second module; transmitting the unique identifier from the second module to the first module; and deriving the unique key in the first module using the unique identifier and the universal key. In accomplishing this and other objects there is provided a method for synchronizing cryptographic keys between a first module and a second module, the second module in communication with the first module, the method comprising the step(s) of: storing a universal key in the first module; storing a unique identifier in the second module; storing a unique key in the second module during manufacture of the second module wherein the unique key is derived from the unique identifier and the universal key; initiating a communication session between the first module and the second module subsequent to manufacture of the first module and the second module; transmitting the unique identifier from the second module to the first module; and deriving the unique key in the first module using the unique identifier and the universal key so that the unique key exists in both the first module and the second module. Additionally, there is provided a method of manufacturing a postage evidencing system including a meter, a printer and a control means for synchronizing cryptographic keys between the meter and the printer.
U.S. Pat. No. 6,075,860, which issued to Ketcham, discloses an Apparatus and Method for Authentication and Encryption of a Remote Terminal over a Wireless Link. This invention provides a method and system for authenticating an authorized user of a remote terminal attempting to interconnect with a computer network over a wireless modem. An encrypted wireless communication channel is established between a remote terminal and a network server for facilitating the authentication process. An authorized user presents an authentication card containing credentials including a user identifier and an authentication encryption key to a remote terminal. The remote terminal establishes a wireless communication channel with a network server which provides a firewall between unauthenticated users and a computer network. The network server and the remote terminal then exchange encrypted information thus verifying the authenticity of each party. The remote terminal and the network server each independently generate a data encryption key for use in establishing a secure encrypted wireless communication channel therebetween. It is an object of this invention to authenticate an authorized user of a remote terminal in a computer network prior to permitting access of that authorized user to the computer network. It is another object of this invention to establish a secure authenticated wireless communication channel between an authorized user of a remote terminal and a computer network. It is yet another object of this invention to provide a system for authenticating an authorized user of a computer network prior to permitting access of the authorized user to the computer network. It is another object of this invention to provide a system for establishing an encrypted authenticated wireless communication channel between a remote terminal and a computer network.
U.S. Pat. No. 6,076,097, which issued to London, discloses a System and Method for Generating Random Numbers. This invention provides a system and method for generating random data without using devices such as gas discharge tubes, leaky capacitors, noise generators or keyboard strokes, and without occupying UNIX timers and/or signals. In accordance with this invention, a loop count is selected and counted. Random data is taken from the least significant (the most active, and therefore the most random) bits of the value of the elapsed time over which the loop was counted. This is completely different from Truerand, which sets the duration for which the loop counts, and then derives random data from the number of times the loop is counted over that set duration. This invention realizes a more efficient and quicker way of generating data that is at least as random as that generated by Truerand. The unpredictability of both this invention and Truerand is based upon the UNIX scheduler and the granularity of the system clock. However, whereas Truerand generates between 25 and 30 bytes of random data per second on a Sun Sparc-20 workstation, this invention generates around 2000 bytes of random data per second on the same platform. Data generated in accordance with this invention has 10 passed chi-squared and compression tests for randomness. This invention advantageously use the standard UNIX system call gettimeofday to determine the elapsed time over which the loop is counted, while Truerand uses the ITIMER.sub.—REAL timer and SIGALRM signal. The use of the UNIX timer and signal precludes their use in the rest of the application in which Truerand occurs, disadvantageously preventing the programmer from easily and simply employing these useful UNIX features elsewhere in the application. This invention advantageously allows the programmer to use the UNIX timer and signal elsewhere in the application. This invention provides a fast, efficient way to generate data proven to be random by chi-squared and compression tests. It does not rely on UNIX timers and signals, allowing these to be used elsewhere in the application that requires random data.
U.S. Pat. No. 6,084,877, which issued to Egbert, discloses a Network Switch Port Configured for Generating an Index Key for a network Switch Routing Table Using a Programmable Hash Function. According to one aspect of this invention, a method for determining a network switch output port for transmission of a data packet having an address received by a network switch input port includes generating a hash key in the network switch input port for the data packet based on the corresponding address, and supplying the hash key generated in the network switch input port to a rules checker configured for determining the output port in response to the supplied hash key. Generation of the hash key in the network switch input port eliminates the necessity in a rules checker of simultaneously generating hash keys for data packets received from multiple switch ports simultaneously. Moreover, the generation of the hash key in the network switch input port enables the hash key to be generated while the remaining portion of the data packet is received, minimizing delays in packet latency through the network switch. Another aspect of this invention provides a network switch configured for outputting a data packet, the network switch comprising a first programmable register for storing a first number specifying a user-specified hash function, and a plurality of network switch ports configured for sending and receiving data packets, each network switch port comprising a hash key generator configured for generating a hash key in response to a received address of a corresponding data packet according to the user-specified hash function, the hash key specifying a corresponding one of a plurality of table entries in a rules checker storing switching logic. The programmable register enables the hash key to be set by a user, enabling different hash key configurations for different network architectures. Moreover, the hash key generator in each network switch port optimizes the efficiency of the rules checker by generating the hash key for a corresponding data packet as the data packet is being received.
U.S. Pat. No. 6,085,323, which issued to Shimizu, discloses an Information Processing System Having Function of Securely Protecting Confidential Information. This information processing system includes a first information processing apparatus and a second information processing apparatus arranged separate from the first information processing apparatus and capable of exchanging a signal with the first information processing apparatus. The first information processing apparatus includes a first key generator for generating a first key, and a first encrypting unit for encrypting data using the first key generated by the first key generator to generate first encrypted information. The second information processing apparatus includes a second key storage unit for storing a second key, and a second encrypting unit for encrypting the first key using the second key stored in the second storage unit to generate second encrypted information. The first information processing apparatus further includes a correlation storage unit for storing the first encrypted information generated by the first encrypting unit and the second encrypted information generated by the second encrypting unit, the first encrypted information being correlated with the second encrypted information. It is an object of this invention to provide an information processing apparatus, an information processing system, an information processing method, a recording medium, and a key determination method and apparatus, which are capable of protecting confidential information stored in the apparatus even if the apparatus is stolen and disassembled. It is another object of this invention to provide an information processing apparatus, an information processing system, an information processing method, a recording medium, and a key determination method and apparatus, capable of storing data shared by a plurality of users in an efficiently and safely encrypted form.
U.S. Pat. No. 6,104,810, which issued to DeBellis, discloses a Pseudorandom Number Generator with Backup and Restoration Capacity. In accordance with the invention, pseudorandom numbers are generated in a cryptographic module in a cryptographically strong manner by concatenating a time-dependent value (generated by a real-time counter) with a secret value and passing the concatenation result through a one-way hash function to generate a hash value from which a random number is generated. Because of this strong one-way function, given the output and any portion of the input, the remaining portion of the input can be computed only by exhaustive search. Entropy is continually added to the system so that breaking one pseudorandom number reveals only those pseudorandom numbers generated before entropy has been added. Thus, the current secret value is continually updated whenever the cryptographic module is idle by a first feedback function that generates a first updated secret value as a one-way function of the current secret value and the current time-dependent value. In addition, the current secret value is updated on the occurrence of a predetermined external event by a second feedback function that generates a second updated secret value as a one-way function of the current secret value, the current time-dependent value and an externally supplied value. Upon power-on reset, if the pseudorandom number generator has not been previously initialized, it initializes itself by resetting the time-dependent and secret values to zero and resetting an initialization count to a predetermined positive value. The initialization count is decremented each time an external event causes the second feedback function to update the secret value; initialization is complete when the initialization count has been decremented to zero. If on power-on reset the pseudorandom number generator has been previously initialized, the current time-dependent and current secret values are restored using values stored in backup registers. In accordance with this invention, to provide integrity and secrecy and to avoid replay attacks, periodic backup of the hardware information to nonvolatile storage is coupled with additional appropriate feedback, update and restoration algorithms. Backup, rather than being direct, uses a hashing function that is different from the hashing function used for normal update. More particularly, while the current time-dependent value is used as backup time-dependent value, a hash of the current secret value that is different from either feedback function is used as a backup secret value. This minimizes the possibility that restoration will result in repetition of pseudorandom numbers. More particularly, one aspect of this invention contemplates a backup and restoration system for a cryptographic pseudorandom number generator in which a secret value is replaced with an updated secret value generated as a first function of the current secret value and a time-dependent value and a pseudorandom number is generated as a second function of the secret value and time-dependent value differing from the first function. In accordance with this aspect of the invention, rather than deriving a backup secret value directly from the current secret value, a backup secret value is generated as a third function of the secret value and time-dependent value differing from the first function. Another aspect of this invention contemplates a backup and restoration system for a cryptographic pseudorandom number generator in which a pseudorandom number is generated as a function of a secret value and a time-dependent value. In accordance with this aspect of the invention, at a predetermined time (as at power-on reset) the pseudorandom number generator determines whether the time-dependent value and the secret value have been previously initialized. If the time-dependent value and the secret value have not been previously initialized, then the pseudorandom number generator initializes these values. On the other hand, if the time-dependent value and the secret value have been previously initialized, the pseudorandom number generator restores these values from backup values rather than reinitializing them.
Although most of these inventions provide a method to generate a key for data in certain way, none of the inventions provide a method or apparatus for generating keys that are both never repeating within certain period of time and difficult to guess. The current invention is a method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess. These character sets can be used as keys to secure data against unauthorized access. The current invention is a product that helps make Web sites faster and more secure.
Most Web sites for on-line shopping uses a number similar to a social security number to identify a user or a user's online shopping cart. The problem of this practice is that if a hacker guesses the Customer ID, that hacker may have access to the data associated with the on-line transactions. The current invention uses a complex mathematical formula to create special groups of characters, called “bodacions”, that are too difficult for a hacker to guess. This makes the Web sites, and the customer's data, more secure. The current invention can also generate unique customer ID's, shopping cart ID's, order numbers, and other data that is both never repeating and difficult to guess.
Most types of communication can be classified as either “connection based” or “connectionless” systems. In a connection based system, the system maintains a persistent connection while the two end points are communicating back and forth in a conversation or session of some duration. The telephone system would be an example for a connection based system. When a caller place a call through the phone system, special digital and sometimes mechanical switches create a connection between the caller and a party that the caller is calling. In effect, the system emulates the presence of a wire between the caller and the party that the caller is calling.
In a connectionless system, the system breaks down communication to and from the communicating parties into discrete inbound and outbound transmissions. The Internet would be an example of a connectionless system. When a Web page with image A and image B is loaded, a Web browser may establish two connections to a server where image A and image B reside, one for each image. The server may have no idea that the two requests for image came from the same browser. The two requests for image A and image B, though seemingly part of the same Web page request, are actually two completely isolated conversations, and may take very different paths through Internet. Further more, a subsequent request for image C would be a brand new conversation, and the server would have no way to know that the request came from the same computer that just requested image A and image B.
Linking the requests together would involve the use of a unique session ID, which the two parties in a conversation must exchange upon each discrete connection. The use of session IDs allows a connectionless system to emulate a connection based system. These IDs can have many uses. These IDs can be used as customer number, order number, etc. By giving each customer and order a unique identifier, not unlike an ISBN for a book or a Social Security number for a person, the server can have knowledge of the identity of the customer upon each visit without a log in or authentication process. These IDs can also be used to insure a user has not modified data that are not authorized to be modified by the user from request to request. These IDs can also be used in secured remote access. If two parties can generate the same session ID at the same time, they can be assured of each other's identity. For example, if a server allows access to a resource by a certain client only at certain times, the client must send a session ID along with each request to access the server. If the client and server have the same session ID, the server may grant the client the access. There are countless other uses for unique session IDs, including keeping track of the time a user has been on a system, the number of accesses to that system from a single user, and more. Session IDs may also be hierarchical, providing a link between members of a group in connection based and connectionless systems alike. The uses are truly endless.
Systems that need to create session IDs face numerous significant challenges. These challenges can differ from system to system. First, it is difficult to guarantee the uniqueness of the session ID generated. For a session ID to be effective in linking discrete sections of a dialog in a connectionless system, the session ID for each dialog must be unique among all dialogs. For example, say a particular server assigns session IDs based on the time in seconds since the system began operation. If two users accessed the system within the same second, the server would think that these two users are actually the same user because same session ID has been assigned to these two different users. Depending on the complexity of the system and its user base, it can be difficult, if not impossible, to make a unique key from user data elements.
Second, it is difficult to defeat hackers. The guessing of session IDs by hackers, or computer bandits, is one of the most prolific methods used to break into systems. Session IDs created by even complex algorithms are simple to guess, and once a hacker has a session ID, it can assume any identity.
Third, it is computationally expensive to increase algorithm complexity. Some one to one hashing techniques and other methods of producing unique sessions are computationally expensive. A busy system may not have the computing resources to produce a session ID that is not simple to guess with some of these algorithms.
Fourth, it is impractical to adopt a pre-generated ID pool. To avoid the problems of uniqueness and CPU usage, some systems will pre-generate a list of session IDs and store them in a file or database. The trouble here is that all parts of the system that require a session ID will require access to that list of session IDs. When one ID issued, the system must lock the entire resource to be sure no two requests for an ID interfere with each other.
In view of all these problems, what is needed then is a method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess.
Accordingly, it is a principal object of my invention to provide a method and apparatus capable of fast generation of a group of character sets that are both never repeating within certain period of time and difficult to guess.
It is a further object of my invention to provide a method and apparatus capable of making web sites faster through its capability of fast generation of a group of character sets that are both never repeating within certain period of time and difficult to guess.
It is a still further object of my invention to provide a method and apparatus capable of making Web sites more secure through its capability of fast generation of a group of character sets that are both never repeating within certain period of time and difficult to guess.
It is a further object of my invention to provide a method and apparatus capable of allowing a connectionless system to emulate a connection based system.
It is a still further object of my invention to provide a method and apparatus capable of enabling a server to have knowledge of the identity of a customer upon each visit without a log in or authentication process.
It is a further object of my invention to provide a method and apparatus, which consumes little CPU resources, for generating a group of character sets that are both never repeating within certain period of time and difficult to guess.
It is a further object of my invention to provide a method and apparatus capable of generating a group of character sets, from a key in parallel, that are both never repeating within certain period of time and difficult to guess.
Other objects of my invention, as well as particular features, elements, and advantages thereof, will be elucidated in, or apparent from, the following description and the accompanying drawing figures.
SUMMARY OF THE INVENTION
According to my present invention I have provided a method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess.
The method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess comprises (a) generating a request for said character set by a client of a character-generating server, (b) sending said request by said client to said character-generating server, (c) generating a pseudo random number required by said character generator, (d) sending said pseudo random number to said character generator, (e) generating a character for said character set by said character generator, and (f) sending said character set by said character-generating server to said client. The method further comprises repeating (c) to (e) until all said characters of said character set have been generated.
The character-generating server further comprises a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator and storing the most current time information, and a key-pool group connecting to said character generator. The character-generating server might have plurality of key-pool groups. Each key-pool group has a key and at least a pool. The pool is a list of mapping positions in said key. The mapping position is marked “used” each time said character-generating server makes a character from said key. The character-generating server clears said pool each time said pool is full, or every tick, whichever comes first.
The character-generating server has an external timer device and a network interface, through which the client connects to the character-generating server. The external timer device is capable of providing both a current time and a periodic tick to the character-generating server. The network interface is capable of providing said character generating-server access to functions to encode and send out information, and to receive and decode information.
The character set generated by character generator is defined by a geometric progression of x(n)=p(x(n−1)+i), which manifests itself as a chaotic progression of orbits around an origin. The orbit is defined as a unique, continuous path around said origin and never crosses in on itself or any other orbit. The x(n) and x(n−1) represents different character sets. The n represents the number of said character set generated by said character-generating server. The i represents a temporal difference between the time when two sequential orbits cross an arbitrary infinite vector from said origin. The p represents a period, which is the temporal difference between character sets along an orbit. The geometric progression defines said pre-set number of periods per orbit. The random generator makes a pseudo random number required by said character generator to select a position on said orbit. The character-generating server is capable of generating several different kind of character set. The character-generating server listens on a fixed port for requests from said client, which can be either a single client or a group of unrelated clients, and never produces any uninitiated transmissions to said client.
The apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess comprises a character-generating server, a network interface connecting to the character generator, and an external timer device connecting to the character generator. The character-generating server further comprises a character generator, a random generator connecting to the character generator, a temporal reference storage connecting to the character generator storing the most current time information, and a key-pool group connecting to the character generator. The character-generating server is capable of generating several different kinds of character sets. The character-generating server has a plurality of key-pool groups.
The network interface is capable of providing said character generating-server access to functions to encode and send out information, and to receive and decode information.
The character set generated by the character generator is defined by a geometric progression of x(n)=p(x(n−1)+i). The geometric progression manifests itself as a chaotic progression of orbits around an origin. The orbit is defined as a unique, continuous path around the origin and never crosses in on itself or any other orbit. The x(n) and the x(n−1) represent different character sets. The n represents the number of said character set generated by the character-generating server. The i represents a temporal difference between the time when two sequential orbits crosses an arbitrary infinite vector from the origin. The p represents a period, which is the temporal difference between character sets along an orbit. The geometric progression defines the pre-set number of periods per orbit.
The random generator makes a pseudo random number required by said character generator to select a position on said orbit. The pool is a list of mapping positions in the key. The mapping position is marked “used” each time the character-generating server makes a character from the key. The character-generating server clears the pool each time the pool is fill, or every tick, whichever comes first. The character-generating server is capable of generating at least the pre-set number of the character sets every tick.
The character-generating server listens on a fixed port for requests from a client, which can be either a single client or a group of clients, and never produces any uninitiated transmissions to the client.
The apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess might also include a remote application, which connects to the character-generating server through the network interface. The remote application has a character-generating utility program, which defines function prototypes for configuring the remote application connection to the character-generating server, and an application program interface, which allows the remote application to query the character-generating server.
DESCRIPTION OF THE DRAWINGS
Other features of my invention will become more evident from a consideration of the following detailed description of my patent drawings, as follows:
FIG. 1 is a preferred embodiment of an apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess;
FIG. 2 is the structure of the character-generating server;
FIG. 3 is the structure of the key-pool group;
FIG. 4 is the matrix used in the preferred embodiment of this invention;
FIG. 5 is a geometric progression of the Raid Series;
FIG. 6 is a flow chart of a method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess;
FIG. 7 is a second embodiment of an apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess; and
FIG. 8 is a chart for a useful application of the bodacion.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
FIG. 1 is a preferred embodiment of an apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess10. Theapparatus10 comprises a character-generatingserver11, anetwork interface12 and anexternal timer device13, both of which are connecting to the character-generating server. Theexternal timer device13 is capable of providing both a current time and a periodic tick to the character-generatingserver11. In the preferred embodiment, theexternal timer device13 provides a periodic tick of approximately one second to the character-generatingserver11. Upon each tick, the character-generatingserver11 increments the values in the temporal reference storage, and clears allpools19,21,23 and24 inFIG. 3. The time length between any two consecutive periodic tick is adjustable. The character-generatingserver11 can exist either as a single task in an embedded environment, a single process daemon in a UNIX environment, a physical circuit or a microchip. Thenetwork interface12 provides said character generating-server11 with access to functions to encode and send out information, and to receive and decode information.
Referring now toFIG. 2, the character-generatingserver11 further comprises acharacter generator14, arandom generator15 connecting to saidcharacter generator14, atemporal reference storage16 connecting to saidcharacter generator14, and a key-pool group17 connecting to saidcharacter generator14. Thetemporal reference storage16 stores the most current time information.
Referring now toFIG. 3, the key-pool group17 may include a first kind of key called session key18 with a first kind of pool calledsession pool19, a second kind of key called unique key20 with a second kind of pool calledunique pool21, and a third kind of key called double key22 with a third kind of pool having two parts, one of which is called double primary pool23, the other of which is called doublerotating pool24. Thecharacter generating server11 will clear thesession pool19 each time thesession pool19 is full, or every one tick, whichever comes first. Theunique pool21, double primary pool23 and doublerotating pool24 are always clear every one tick. In the preferred embodiment, one tick equals to approximately one second.
The character set generated by the character-generatingserver11 is called bodacion. The bodacion is essentially a whole number mapped to a matrix of specially selected letters and numbers30 inFIG. 4. The matrix of characters30 is created by assigning each potential character to a number from 1 to 32 using a complex polynomial. The size of the matrix30 does not need to be 32, it can be multiple of 32. The number of characters in the matrix30 defines not only the length of the bodacion, but the number of the bodacion generated by the character-generatingserver11 as well. For example, when the matrix30 has 32 characters, each bodacion generated by the character-generatingserver11 will have 32 digits, and the character-generatingserver11 is capable of generating 1,065,151,899,408 session bodacions, 32 unique bodacions and 1024 double bodacions per tick. When the size of the matrix increases, the character-generatingserver11 will be able to generate more bodacions of any kinds per tick. In the preferred embodiment, the character-generatingserver11 is capable of generating 1,065,151,889,408 session bodacions before it repeats a value if all the session bodacions are requested in a constant stream. Actual number of session bodacions generated before repeating depends on the character-generatingserver11 restarts and idle time.
InFIG. 4, 32 different characters have been listed along with assigned number from 1 to 32. The matrix30 intentionally excludes characters such as lower case l (el) and the number 1 (one), because in certain computer fonts, these characters may appear identical. Similar reasons preclude the use of the letter O (oh) and the number 0 (zero). Of course, the matrix30 can be re-arranged in any way with any characters. As long as the size of the matrix30 stays the same, the character-generatingserver11 will have the same capacity in generating the bodacions. Theoretically, there is no limitation as to what kinds of character can be used in the matrix30.
The mapping into the matrix30 is chosen using a geometric progression of the form x(n)=p(x(n−1)+i) called the “Raki” series. The exact form of the Raki series manifests itself as a chaotic progression oforbits44 around an origin41, roughly shown inFIG. 5. Theline40 represents the values of the Raki series moving around the origin41. The magnitude of the origin41 is not relevant to the orbital paths.
Referring now toFIGS. 4 and 5, abodacion42 is defined as the value of the Raki series as mapped to a matrix30 of computer characters. Thecharacter generator14 runs the Raki series and produces any of the possible bodacion types. Each time thecharacter generator14 creates a bodacion from a given position in the matrix30, it set that position in the pool to “used”. Thesession pool19 is a list of mapping positions in thesession key18, and the mapping position is marked “used” each time saidcharacter generator14 makes a character from the session key. Theunique pool21 is a list of mapping positions in the unique key20, and the mapping position is marked “used” each time saidcharacter generator14 makes a character from said unique key. The double pool comprises a double primary pool23 and a doublerotating pool24. The double key22 comprises a primary key22aand a rotating key22b. The double primary pool23 is a list of primary mapping positions in said primary key22aand said doublerotating pool24 is a list of rotating mapping positions in said rotating key22b. The primary mapping position is marked “used” each time saidcharacter generator14 makes a character from said primary key22a, and said rotating mapping position is marked “used” each time saidcharacter generator14 makes a character from said rotating key22b.
In the preferred embodiment, since the size of matrix30 is 32, the number of bodacions defined by the Raki series is 32!. Anorbit44 is defined as a unique and continuous path around an origin41 that never crosses in on itself or anyother orbit44. The Raki series defines an infinite number of orbitals, but only about 33 billion of these orbits easily map to the character matrix (327326). A period45 is the temporal difference betweenbodacions42 along anorbit44. In the preferred embodiment, the Raki series defines 32 periods45 perorbit44 to accommodate 32bodacions42 on each orbital path before abodacion42 will repeat. A cycle47 is the temporal difference between the time when twosequential orbits44 cross an arbitraryinfinite vector46 from the origin41. A seed48 is the value of the Raki series as it moves from oneorbit44 to the next, defined by its crossing of an arbitraryinfinite vector46 from the origin41. Although anybodacion42 is created with the Raki series, theorbit44 and the seed48 may be fed into the Raki series to createreproducible bodacions42. If a continuously growing seed48 andorbit44 are used, thebodacions42 shall be unique within that data space. For example, if time is used, bodacions42 will temporally unique within the entire set ofbodacions42. If a sine wave is used, thefirst bodacion42 would be repeated after π orbits44.
In the preferred embodiment, the character-generatingserver11 is capable of generating at least three kinds of bodacions, including the session bodacion, the unique bodacion and the double bodacion. The session bodacion is easier to guess than the unique bodacion and the double bodacion. The double bodacion is an extension of the unique bodacion in the sense that the double bodacion will not repeat for twenty-eight years in the preferred embodiment with an approximately one second per tick, but is simpler to guess than the unique bodacion.
The character-generatingserver11 listens on a fixed port for requests from a client and never produces any uninitiated transmissions to the client. This means that the character-generating server will only produce and a bodacion and send it out to the client after each request, and will never check whether the bodacion is actually received by the client. A character-generatingserver11 can produce bodacions for a single client or a group of clients.
Referring now toFIG. 6, which is a flow chart of a method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess. A procedure starts atblock60, and proceeds immediately to block61, where a check is conducted to determine if a request for a bodacion by a client has been received by the character-generatingserver11. If NO, the procedure continues looping awaiting a request for a bodacion by a client. If YES, the procedure proceeds to block62. Atblock62, therandom generator15 generates a pseudo random number required by thecharacter generator14 to select a position on theorbit44, and proceeds to block63. Atblock63, therandom generator15 sends the pseudo random number to thecharacter generator14, and proceeds to block64. Atblock64, thecharacter generator14 generates a character for the requested bodacion based on a geometric progression of x(n)=p(x(n−1)+i), and proceeds to block65. Atblock65, a check is conducted to determine if all the characters for a bodacion have been generated by thecharacter generator14. If NO, the procedure goes back to block62. Returning to block65, if all the characters for a bodacion have been generated by thecharacter generator14, the procedure proceeds to block66. Atblock66, the procedure sends the generated bodacion to the client, and proceeds to block67, and ends right there.
FIG. 7 is a second embodiment of an apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess70. The apparatus70 comprises a character-generatingserver11, anetwork interface12, anexternal timer device13 and aremote application71. Both thenetwork interface12 and theexternal timer device13 are connecting to the character-generatingserver11. Theremote application71 is connecting to the character-generatingserver11 through thenetwork interface12. Theremote application71 has a character-generating utility program72 and anapplication program interface73. The character-generating utility program72 defines function prototypes for configuring theremote application71 connection to the character-generatingserver11. Theapplication program interface73 allows theremote application71 to query the character-generatingserver11.
FIG. 8 is a chart for a useful application of the bodacion. When aremote application71 wants to access a target server82, theremote application71 first generates a key by itself, and sends the key along with a request for a bodacion to the character-generatingserver11. The bodacion that is requested can be any type of bodacion. The character-generatingserver11 generates a bodacion from the key received from theremote application71, and sends the key along with the generated bodacion back to theremote application71. Theremote application71 will then send the key along with the bodacion to target server82 to request a permission to access the target server82. The target server82 will then send the key received from theremote application71 along with a request for bodacion to the character-generatingserver11. The character-generatingserver11 will again generate the same bodacion from the key received from the target server82, and send the bodacion along with the key back to the target server82. The target server82 then compares the bodacion received from the character-generatingserver11 to the bodacion received from theremote application71. If they are the same bodacion, an access will be granted to theremote application71. Otherwise, access will be denied to theremote application71.
Hence, the present invention provides a method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess.
The present invention also provides a method and apparatus capable of making web sites faster through its capability of fast generation of a group of character sets that are both never repeating within certain period of time and difficult to guess.
The present invention further provides a method and apparatus capable of making Web sites more secure through its capability of fast generation of a group of character sets that are both never repeating within certain period of time and difficult to guess.
The present invention still further provides a method and apparatus capable of allowing a connectionless system to emulate a connection based system.
The present invention further provides a method and apparatus capable of enabling a server to have knowledge of the identity of a customer upon each visit without a log in or authentication process.
The present invention still further provides a method and apparatus, which consumes little CPU resources, for generating a group of character sets that are both never repeating within certain period of time and difficult to guess.
The present invention further provides a method and apparatus capable of generating a group of character sets, from a key in parallel, that are both never repeating within certain period of time and difficult to guess.
As various possible embodiments may be made in the above invention for use for different purposes and as various changes might be made in the embodiments and methods above set forth, it is understood that all of the above matters here set forth or shown in the accompanying drawings are to be interpreted as illustrative and not in a limiting sense.

Claims (158)

1. An apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said apparatus comprising:
a character-generating server, said character-generating server existing either as a single task in an embedded environment, a single process daemon in a UNIX environment, a physical circuit or a microchip, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group connecting to said character generator, said key-pool group including any or all of a first type of key with a first type of pool, a second type of key with a second type of pool, and a third type of key with a third type of pool, said character generator capable of generating a character set, said character set having thirty-two different characters, based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits cross an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining thirty-two periods on any of said orbit, said character set being a first type of character set, a second type of character set or a third type of character set;
a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information; and
an external timer device, said external timer device connecting to said character-generating server and capable of providing both a current time and a periodic tick of approximately one second to said character-generating server.
15. An apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said apparatus comprising:
a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group connecting to said character generator, said key-pool group including any or all of a first type of key with a first type of pool, a second type of key with a second type of pool, and a third type of key with a third type of pool, said character generator capable of generating a character set, said character set having a pre-set number of different characters, based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining said pre-set number of periods on any of said orbit, said character set being a first type of character set, a second type of character set and a third type of character set;
a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive or decode information; and
an external timer device, said external timer device connecting to said character-generating server and capable of providing both a current time and a periodic tick to said character-generating server, time interval between any of two consecutive said periodic ticks being adjustable.
29. An apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said apparatus comprising:
a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group, said key-pool group having a key and a pool, connecting to said character generator, said character generator capable of generating a character set, said character set having a preset number of different characters, based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period is the temporal difference between character sets along any of said orbit, said geometric progression defining said pre-set number of periods on any of said orbit;
a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information; and
an external timer device, said external timer device connecting to said character-generating server and capable of providing both a current time and a periodic tick to said character-generating server, time interval between any of two consecutive said periodic ticks being adjustable.
38. An apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said apparatus comprising:
a character-generating server, said character-generating server existing either as a single task in an embedded environment, a single process daemon in a UNIX environment, a physical circuit or microchip, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group connecting to said character generator, said key-pool group including any or all of a first type of key with a first type of pool, a second type of key with a second type of pool, and a third type of key with a third type of pool, said character generator capable of generating a character set, said character set having thirty-two different characters, based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits cross an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining thirty-two periods on any of said orbit, said character set being a first type of character set, a second type of character set or a third type of character set;
a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information;
an external timer device, said external timer device connecting to said character-generating server and capable of providing both a current time and a periodic tick of approximately one second to said character-generating server; and
a remote application, said remote application connecting to said character-generating server through said network interface, said remote application having a character-generating utility program, said character-generating utility program defining function prototypes for configuring said remote application connection to said character-generating server, and an application program interface, said application program interface allowing said remote application to query said character-generating server for said first type of character set, said second type of character set and said third type of character.
52. An apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said apparatus comprising:
a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group connecting to said character generator, said key-pool group including any or all of a first type of key with a first type of pool, a second type of key with a second type of pool, and a third type of key with a third type of pool, said character generator capable of generating a character set, said character set having a pre-set number of different characters, based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining said pre-set number of periods on any of said orbit, said character set being a first type of character set, a second type of character set and a third type of character set;
a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information;
an external timer device, said external timer device connecting to said character-generating server and capable of providing both a current time and a periodic tick to said character-generating server, time interval between any of two consecutive said periodic ticks being adjustable; and
a remote application, said remote application connecting to said character-generating server through said network interface, said remote application having a character-generating utility program, said character-generating utility program defining function prototypes for configuring said remote application connection to said character-generating server, and an application program interface, said application program interface allowing said remote application to query said character-generating server for said first type of character set, said second type of character set and said third type of character.
66. An apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said apparatus comprising:
a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group, said key-pool group having a key and a pool, connecting to said character generator, said character generator capable of generating a character set, said character set having a preset number of different characters, based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining said pre-set number of periods on any of said orbit;
a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information;
an external timer device, said external timer device connecting to said character-generating server and capable of providing both a current time and a periodic tick to said character-generating server, time interval between any of two consecutive said periodic ticks being adjustable; and
a remote application, said remote application connecting to said character-generating server through said network interface, said remote application having a character-generating utility program, said character-generating utility program defining function prototypes for configuring said remote application connection to said character-generating server, and an application program interface, said application program interface allowing said remote application to query said character-generating server for said character set.
75. A method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said method comprising:
(a) generating a request for said character set by a client of a character-generating server, said character-generating server existing either as a single task in an embedded environment or as a single process daemon in a UNIX environment, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group connecting to said character generator, said key-pool group including any or all of a first type of key with a first type of pool, a second type of key with a second type of pool, and a third type of key with a third type of pool;
(b) sending said request by said client to said character-generating server, said character-generating server having an external timer device capable of providing both a current time and a periodic tick of approximately one second to said character-generating server, said client connecting to said character-generating server through a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information;
(c) generating a pseudo random number required by said character generator;
(d) sending said pseudo random number to said character generator;
(e) generating a character for said character set, said character set having thirty-two different characters, by said character generator based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining thirty-two periods on any of said orbit, said character set being a first type of character set, a second type of character set and a third type of character set; and
(f) sending said character set by said character-generating server to said client.
90. A method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said method comprising:
(a) generating a request for said character set by a client of a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group connecting to said character generator, said key-pool group including any or all of a first type of key with a first type of pool, a second type of key with a second type of pool, and a third type of key with a third type of pool;
(b) sending said request by said client to said character-generating server, said character-generating server having an external timer device capable of providing both a current time and a periodic tick to said character-generating server, time interval between any of two consecutive said periodic ticks being adjustable, said client connecting to said character-generating server through a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information;
(c) generating a pseudo random number required by said character generator;
(d) sending said pseudo random number to said character generator;
(e) generating a character for said character set, said character set having a pre-set number of characters, by said character generator based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining a pre-set number of periods on any of said orbit, said character set being a first type of character set, a second type of character set and a third type of character set; and
(f) sending said character set by said character-generating server to said client.
105. A method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said method comprising:
(a) generating a request for said character set by a client of a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group, said key-pool group having a key and a pool, connecting to said character generator;
(b) sending said request by said client to said character-generating server, said character-generating server having an external timer device capable of providing both a current time and a periodic tick to said character-generating server, time interval between any of two consecutive said periodic ticks being adjustable, said client connecting to said character-generating server through a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information;
(c) generating a pseudo random number required by said character generator;
(d) sending said pseudo random number to said character generator;
(e) generating a character for said character set, said character set having a pre-set number of characters, by said character generator based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining said pre-set number of periods on any of said orbit; and
(f) sending said character set by said character-generating server to said client.
115. A method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said method comprising:
(a) generating a request for said character set by a client of a character-generating server, said character-generating server existing either as a single task in an embedded environment or as a single process daemon in a UNIX environment, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group connecting to said character generator, said key-pool group including any or all of a first type of key with a first type of pool, a second type of key with a second type of pool, and a third type of key with a third type of pool;
(b) sending said request by said client to said character-generating server, said character-generating server having an external timer device capable of providing both a current time and a periodic tick of approximately one second to said character-generating server, said client connecting to said character-generating server through a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information;
(c) generating a pseudo random number required by said character generator;
(d) sending said pseudo random number to said character generator;
(e) generating a character for said character set, said character set having thirty-two different characters, by said character generator based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining thirty-two periods on any of said orbit, said character set being a first type of character set, a second type of character set and a third type of character set; and
(f) sending said character set along with a related key by said character-generating server to said client;
(g) sending said character set along with said related key to a target server, said target server connecting to said character-generating server through said network interface, said target server having a character-generating utility program, said character-generating utility program defines function prototypes for configuring said target server connection to said character-generating server, and an application program interface, said application program interface allows said target server to query said character-generating server for said first type of character set, said second type of character set or said third type of character set;
(h) sending said related key to said character-generating server by said target server;
(i) re-creating said character set from said related key by said target server; and
(j) sending said character set along with said related key to said target server.
130. A method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said method comprising:
(a) generating a request for said character set by a client of a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage stores the most current time information, and a key-pool group connecting to said character generator, said key-pool group includes any or all of a first type of key with a first type of pool, a second type of key with a second type of pool, and a third type of key with a third type of pool;
(b) sending said request by said client to said character-generating server, said character-generating server having an external timer device capable of providing both a current time and a periodic tick to said character-generating server, time interval between any of two consecutive said periodic ticks being adjustable, said client connecting to said character-generating server through a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information;
(c) generating a pseudo random number required by said character generator;
(d) sending said pseudo random number to said character generator;
(e) generating a character for said character set, said character set having a pre-set number of characters, by said character generator based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifests itself as a chaotic progression of orbits around an origin, said orbit is defined as a unique and continuous path around said origin that never crosses in on itself or any other orbit, said x(n) and said x(n−1) represent different character set, said n represents the number of said character set generated by said character-generating server, said i represents a temporal difference between the time when two sequential orbits cross an arbitrary infinite vector from said origin, said p represents a period, said period is the temporal difference between character sets along any of said orbit, said geometric progression defines a pre-set number of periods on any of said orbit, said character set can be a first type of character set, a second type of character set and a third type of character set; an
(f) sending said character set along with a related key by said character-generating server to said client;
(g) sending said character set along with said related key to a target server, said target server connecting to said character-generating server through said network interface, said target server having a character-generating utility program, said character-generating utility program defining function prototypes for configuring said target server connection to said character-generating server, and an application program interface, said application program interface allowing said target server to query said character-generating server for said first type of character set, said second type of character set or said third type of character set;
(h) sending said related key to said character-generating server by said target server;
(i) re-creating said character set from said related key by said target server; and
(j) sending said character set along with said related key to said target server.
145. A method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said method comprising:
(a) generating a request for said character set by a client of a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, said temporal reference storage storing the most current time information, and a key-pool group, said key-pool group having a key and a pool, connecting to said character generator;
(b) sending said request by said client to said character-generating server, said character-generating server having an external timer device capable of providing both a current time and a periodic tick to said character-generating server, time interval between any of two consecutive said periodic ticks being adjustable, said client connecting to said character-generating server through a network interface, said network interface connecting to said character generator and capable of providing said character generating-server with access to functions to encode and send out information, and to receive and decode information;
(c) generating a pseudo random number required by said character generator;
(d) sending said pseudo random number to said character generator;
(e) generating a character for said character set, said character set having a pre-set number of characters, by said character generator based on a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique and continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character set, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along any of said orbit, said geometric progression defining said pre-set number of periods on any of said orbit;
(f) sending said character set along with a related key by said character-generating server to said client;
(g) sending said character set along with said related key to a target server, said target server connecting to said character-generating server through said network interface, said target server having a character-generating utility program, said character-generating utility program defining function prototypes for configuring said target server connection to said character-generating server, and an application program interface, said application program interface allowing said target server to query said character-generating server for said character set;
(h) sending said related key to said character-generating server by said target server;
(i) re-creating said character set from said related key by said target server; and
(j) sending said character set along with said related key to said target server.
155. An apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said apparatus comprising:
a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, and a key-pool group, said key-pool group having a key and a pool, connecting to said character generator, said character-generating server being capable of generating a character set, said character set having a pre-set number of different characters, the character set being defined by a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique, continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character sets, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along an orbit, said geometric progression defining said pre-set number of periods per orbit;
a network interface, said network interface connecting to said character generator; and
an external timer device, said external timer device connecting to said character-generating server.
156. An apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said apparatus comprising:
a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, and a key-pool group, said key-pool group having a key and a pool, connecting to said character generator, said character-generating server capable of generating a character sets, said character set having a pre-set number of different characters, said character set being defined by a geometric progression of x(n)=p(x(n−1)+i), said geometric progression manifesting itself as a chaotic progression of orbits around an origin, said orbit being defined as a unique, continuous path around said origin and never crossing in on itself or any other orbit, said x(n) and said x(n−1) representing different character sets, said n representing the number of said character set generated by said character-generating server, said i representing a temporal difference between the time when two sequential orbits crossing an arbitrary infinite vector from said origin, said p representing a period, said period being the temporal difference between character sets along an orbit, said geometric progression defining said pre-set number of periods per orbit;
a network interface, said network interface connecting to said character generator;
an external timer device, said external timer device connecting to said character-generating server; and
a remote application, said remote application connecting to said character-generating server through said network interface, said remote application having a character-generating utility program, said character-generating utility program defining function prototypes for configuring said remote application connection to said character-generating server, and an application program interface, said application program interface allows said remote application to query said character-generating server for said character set.
157. A method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said method comprising:
(a) generating a request for said character set by a client of a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, and a key-pool group, said temporal reference storage storing the most current time information, said key-pool group having a key and a pool, connecting to said character generator, said character-generating server being capable of generating a character set, said character set having a pre-set number of different characters;
(b) sending said request by said client to said character-generating server, said character-generating server having an external timer device, said external timer device connecting to said character-generating server, said client connecting to said character-generating server through a network interface, said network interface connecting to said character generator;
(c) generating a pseudo random number required by said character generator;
(d) sending said pseudo random number to said character generator;
(e) generating a character for said character set by said character generator; and
(f) sending said character set by said character-generating server to said client.
158. A method for generating a group of character sets that are both never repeating within certain period of time and difficult to guess, said method comprising:
(a) generating a request for said character set by a client of a character-generating server, said character-generating server comprising a character generator, a random generator connecting to said character generator, a temporal reference storage connecting to said character generator, and a key-pool group, said temporal reference storage storing the most current time information, said key-pool group having a key and a pool, connecting to said character generator, said character-generating server capable of generating a character set, said character set having a pre-set number of different characters;
(b) sending said request by said client to said character-generating server, said character-generating server having an external timer device, said external timer device connecting to said character-generating sewer, said client connecting to said character-generating server through a network interface, said network interface connecting to said character generator;
(c) generating a pseudo random number required by said character generator;
(d) sending said pseudo random number to said character generator;
(e) generating a character for said character set by said character generator;
(f) sending said character set along with a related key by said character-generating sewer to said client;
(g) sending said character set along with said related key to a target server, said target server connecting to said character-generating sewer through said network interface, said target server having a character-generating utility program, said character-generating utility program defining function prototypes for configuring said target server connection to said character-generating server, and an application program interface, said application program interface allowing said target server to query said character-generating server for said character set;
(h) sending said related key to said character-generating server by said target server;
(i) re-creating said character set from said related key by said target server; and
(j) sending said character set along with said related key to said target server.
US09/725,7862000-11-292000-11-29Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guessExpired - Fee RelatedUS6987853B2 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US09/725,786US6987853B2 (en)2000-11-292000-11-29Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess
PCT/US2001/051137WO2002058320A1 (en)2000-11-292001-11-01Method and apparatus for generating a group of characters sets that are both never repeating
AU2002241778AAU2002241778A1 (en)2000-11-292001-11-01Method and apparatus for generating a group of characters sets that are both never repeating

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US09/725,786US6987853B2 (en)2000-11-292000-11-29Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess

Publications (2)

Publication NumberPublication Date
US20020064279A1 US20020064279A1 (en)2002-05-30
US6987853B2true US6987853B2 (en)2006-01-17

Family

ID=24915961

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US09/725,786Expired - Fee RelatedUS6987853B2 (en)2000-11-292000-11-29Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess

Country Status (3)

CountryLink
US (1)US6987853B2 (en)
AU (1)AU2002241778A1 (en)
WO (1)WO2002058320A1 (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030149876A1 (en)*2002-02-012003-08-07Secure Choice LlcMethod and system for performing perfectly secure key exchange and authenticated messaging
US20030159063A1 (en)*2002-02-072003-08-21Larry ApfelbaumAutomated security threat testing of web pages
US20030210787A1 (en)*2002-05-102003-11-13Harris Corporation, Corporation Of The State Of DelawareSecure mobile ad-hoc network and related methods
US20040052375A1 (en)*2002-09-122004-03-18International Business Machines CorporationDynamic systm bus encryption using improved differential transitional encoding
US20040127211A1 (en)*2002-09-242004-07-01Jean-Philippe WaryMethod for the production, by a service provider, of a multimedia isolating identifier
US20040146163A1 (en)*2002-10-282004-07-29Nokia CorporationDevice keys
US20040193489A1 (en)*2000-08-142004-09-30Eric BoydOffline-online incentive points system and method
US20050071634A1 (en)*2001-11-192005-03-31Claude MeggleCertification apparatus, method and device for authenticating message origin
US20050125655A1 (en)*2003-11-072005-06-09Daimlerchrysler AgProcess for detecting defective component exchanges
US20050180572A1 (en)*2004-02-182005-08-18Graunke Gary L.Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US20060013402A1 (en)*2004-07-142006-01-19Sutton James A IiMethod of delivering Direct Proof private keys to devices using an on-line service
US20060117181A1 (en)*2004-11-302006-06-01Brickell Ernest FApparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US20070273674A1 (en)*2005-03-182007-11-29Searete Llc, A Limited Liability CorporationMachine-differentiatable identifiers having a commonly accepted meaning
US20080209249A1 (en)*2007-02-272008-08-28Tso Theodore YUse of a UUID as a Time Epoch to Determine if the System Clock Has Been Reset Backwards in Time
US20090141891A1 (en)*2001-03-272009-06-04Microsoft CorporationDistributed scalable cryptographic access control
US20100157890A1 (en)*2008-12-192010-06-24Robert Bosch GmbhMethod of wireless communication using authentication information
US20100299529A1 (en)*2009-03-252010-11-25Pacid Technologies, LlcMethod and system for securing communication
US8014530B2 (en)2006-03-222011-09-06Intel CorporationMethod and apparatus for authenticated, recoverable key distribution with no database secrets
US20120106733A1 (en)*2010-11-032012-05-03Falch Janet MSystem and method for data encryption
US8479021B2 (en)2011-09-292013-07-02Pacid Technologies, LlcSecure island computing system and method
US8539241B2 (en)2009-03-252013-09-17Pacid Technologies, LlcMethod and system for securing communication
US8712044B2 (en)*2012-06-292014-04-29Dark Matter Labs Inc.Key management system
US8726032B2 (en)2009-03-252014-05-13Pacid Technologies, LlcSystem and method for protecting secrets file
US20140136418A1 (en)*2011-09-292014-05-15Pacid Technologies, LlcSystem and method for application security
US8774403B2 (en)2011-12-082014-07-08Dark Matter Labs, Inc.Key creation and rotation for data encryption
US8782408B2 (en)2009-03-252014-07-15Pacid Technologies, LlcMethod and system for securing communication
US8959350B2 (en)2009-03-252015-02-17Pacid Technologies, LlcToken for securing communication
US20230318809A1 (en)*2021-10-192023-10-05Google LlcMulti-key information retrieval

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020078026A1 (en)*2000-12-142002-06-20Fergus Joseph E.Method and apparatus for bulk data remover
JP2003087238A (en)*2001-09-112003-03-20Hitachi Ltd Security Implementation Method for Home Network
US7376235B2 (en)*2002-04-302008-05-20Microsoft CorporationMethods and systems for frustrating statistical attacks by injecting pseudo data into a data system
CA2488514A1 (en)*2002-06-062003-12-18Cryptico A/SMethod for improving unpredictability of output of pseudo-random number generators
US20040086117A1 (en)*2002-06-062004-05-06Petersen Mette VesteragerMethods for improving unpredictability of output of pseudo-random number generators
GB0303256D0 (en)*2003-02-132003-03-19Gamesman LtdAn award indicating device
US20050125288A1 (en)*2003-09-022005-06-09Augustine FouMethods and system for facilitating sales using a payment-related product
EP1934742A4 (en)*2005-08-252009-08-19Fortify Software IncApparatus and method for analyzing and supplementing a program to provide security
US8117443B1 (en)*2005-10-052012-02-14Oracle America, Inc.Method and apparatus for generating location independent unique identifiers
US7653895B1 (en)*2006-01-202010-01-26Xilinx, Inc.Memory arrangement for message processing by a plurality of threads
US8032874B1 (en)2006-01-202011-10-04Xilinx, Inc.Generation of executable threads having source code specifications that describe network packets
US9146789B2 (en)2006-03-212015-09-29Oracle America, Inc.Method and apparatus for generating and using location-independent distributed object references
US20090046849A1 (en)*2007-04-232009-02-19Bally Gaming, Inc.Data integrity and non-repudiation method
KR100961442B1 (en)*2007-11-142010-06-09한국전자통신연구원 Key Graph Construction Method and Key Management Method Using Multi-group Multicasting Service
US8307209B2 (en)*2007-12-142012-11-06James NgUniversal authentication method
US20090158038A1 (en)*2007-12-142009-06-18James NgUniversal authentication method
US9444622B2 (en)*2008-09-152016-09-13Hewlett Packard Enterprise Development LpComputing platform with system key
US9521130B2 (en)*2012-09-252016-12-13Virnetx, Inc.User authenticated encrypted communication link
KR101516773B1 (en)*2013-03-062015-05-04홍바울Payment system using barcode and method thereof
CN105450400B (en)*2014-06-032019-12-13阿里巴巴集团控股有限公司Identity verification method, client, server and system
CN106161368B (en)*2015-04-072020-04-14阿里巴巴集团控股有限公司Method, device and system for remotely accessing cloud application
CN111177688B (en)*2019-12-262022-10-14微梦创科网络科技(中国)有限公司 A kind of security authentication method and device based on figurative language mixed font
CN113946583A (en)*2021-10-252022-01-18浙江惠瀜网络科技有限公司 Primary key generation method and device
CN114969059B (en)*2022-07-282022-10-25建信金融科技有限责任公司Method and device for generating order information, electronic equipment and storage medium

Citations (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4255811A (en)1975-03-251981-03-10International Business Machines CorporationKey controlled block cipher cryptographic system
US5349642A (en)1992-11-031994-09-20Novell, Inc.Method and apparatus for authentication of client server communication
US5383134A (en)*1992-12-281995-01-17Motorola, Inc.Data transmission device, system and method
US5633931A (en)1995-06-301997-05-27Novell, Inc.Method and apparatus for calculating message signatures in advance
US5740243A (en)*1989-07-131998-04-14Rehm; Peter HorstCryptographic guessing game
US5892827A (en)1996-06-141999-04-06Catalina Marketing International, Inc.Method and apparatus for generating personal identification numbers for use in consumer transactions
US5913217A (en)1997-06-301999-06-15Microsoft CorporationGenerating and compressing universally unique identifiers (UUIDs) using counter having high-order bit to low-order bit
US5915021A (en)1997-02-071999-06-22Nokia Mobile Phones LimitedMethod for secure communications in a telecommunications system
US5963646A (en)1997-03-101999-10-05The Pacid GroupSecure deterministic encryption key generator system and method
US5982892A (en)1997-12-221999-11-09Hicks; Christian BielefeldtSystem and method for remote authorization for unlocking electronic data
US6064989A (en)1997-05-292000-05-16Pitney Bowes Inc.Synchronization of cryptographic keys between two modules of a distributed system
US6076097A (en)1997-12-112000-06-13At&T Corp.System and method for generating random numbers
US6075860A (en)1997-02-192000-06-133Com CorporationApparatus and method for authentication and encryption of a remote terminal over a wireless link
US6085323A (en)1996-04-152000-07-04Kabushiki Kaisha ToshibaInformation processing system having function of securely protecting confidential information
US6084877A (en)1997-12-182000-07-04Advanced Micro Devices, Inc.Network switch port configured for generating an index key for a network switch routing table using a programmable hash function
US6104810A (en)1997-05-152000-08-15International Business Machines CorporationPseudorandom number generator with backup and restoration capability
US6640301B1 (en)*1999-07-082003-10-28David Way NgThird-party e-mail authentication service provider using checksum and unknown pad characters with removal of quotation indents

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5414771A (en)*1993-07-131995-05-09Mrj, Inc.System and method for the creation of random sequences and for the cryptographic protection of communications
US5440640A (en)*1993-10-051995-08-08Arithmetica, Inc.Multistream encryption system for secure communication
US5940508A (en)*1997-04-071999-08-17Motorola, Inc.Method and apparatus for seamless crypto rekey system
US6285761B1 (en)*1998-03-042001-09-04Lucent Technologies, Inc.Method for generating pseudo-random numbers

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4255811A (en)1975-03-251981-03-10International Business Machines CorporationKey controlled block cipher cryptographic system
US5740243A (en)*1989-07-131998-04-14Rehm; Peter HorstCryptographic guessing game
US5349642A (en)1992-11-031994-09-20Novell, Inc.Method and apparatus for authentication of client server communication
US5383134A (en)*1992-12-281995-01-17Motorola, Inc.Data transmission device, system and method
US5633931A (en)1995-06-301997-05-27Novell, Inc.Method and apparatus for calculating message signatures in advance
US6085323A (en)1996-04-152000-07-04Kabushiki Kaisha ToshibaInformation processing system having function of securely protecting confidential information
US5892827A (en)1996-06-141999-04-06Catalina Marketing International, Inc.Method and apparatus for generating personal identification numbers for use in consumer transactions
US5915021A (en)1997-02-071999-06-22Nokia Mobile Phones LimitedMethod for secure communications in a telecommunications system
US6075860A (en)1997-02-192000-06-133Com CorporationApparatus and method for authentication and encryption of a remote terminal over a wireless link
US5963646A (en)1997-03-101999-10-05The Pacid GroupSecure deterministic encryption key generator system and method
US6104810A (en)1997-05-152000-08-15International Business Machines CorporationPseudorandom number generator with backup and restoration capability
US6064989A (en)1997-05-292000-05-16Pitney Bowes Inc.Synchronization of cryptographic keys between two modules of a distributed system
US5913217A (en)1997-06-301999-06-15Microsoft CorporationGenerating and compressing universally unique identifiers (UUIDs) using counter having high-order bit to low-order bit
US6076097A (en)1997-12-112000-06-13At&T Corp.System and method for generating random numbers
US6084877A (en)1997-12-182000-07-04Advanced Micro Devices, Inc.Network switch port configured for generating an index key for a network switch routing table using a programmable hash function
US5982892A (en)1997-12-221999-11-09Hicks; Christian BielefeldtSystem and method for remote authorization for unlocking electronic data
US6640301B1 (en)*1999-07-082003-10-28David Way NgThird-party e-mail authentication service provider using checksum and unknown pad characters with removal of quotation indents

Cited By (63)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040193489A1 (en)*2000-08-142004-09-30Eric BoydOffline-online incentive points system and method
US7424617B2 (en)*2000-08-142008-09-09Yahoo! Inc.Offline-online incentive points system and method
US8331560B2 (en)*2001-03-272012-12-11Microsoft CorporationDistributed scalable cryptographic access control
US20090141891A1 (en)*2001-03-272009-06-04Microsoft CorporationDistributed scalable cryptographic access control
US20050071634A1 (en)*2001-11-192005-03-31Claude MeggleCertification apparatus, method and device for authenticating message origin
US20030149876A1 (en)*2002-02-012003-08-07Secure Choice LlcMethod and system for performing perfectly secure key exchange and authenticated messaging
US20030159063A1 (en)*2002-02-072003-08-21Larry ApfelbaumAutomated security threat testing of web pages
US7975296B2 (en)*2002-02-072011-07-05Oracle International CorporationAutomated security threat testing of web pages
US20030210787A1 (en)*2002-05-102003-11-13Harris Corporation, Corporation Of The State Of DelawareSecure mobile ad-hoc network and related methods
US7346167B2 (en)*2002-05-102008-03-18Harris CorporationSecure mobile ad-hoc network and related methods
US20040052375A1 (en)*2002-09-122004-03-18International Business Machines CorporationDynamic systm bus encryption using improved differential transitional encoding
US7248696B2 (en)*2002-09-122007-07-24International Business Machines CorporationDynamic system bus encryption using improved differential transitional encoding
US20040127211A1 (en)*2002-09-242004-07-01Jean-Philippe WaryMethod for the production, by a service provider, of a multimedia isolating identifier
US20040146163A1 (en)*2002-10-282004-07-29Nokia CorporationDevice keys
US7920706B2 (en)*2002-10-282011-04-05Nokia CorporationMethod and system for managing cryptographic keys
US20050125655A1 (en)*2003-11-072005-06-09Daimlerchrysler AgProcess for detecting defective component exchanges
US7747869B2 (en)*2003-11-072010-06-29Daimler AgProcess for detecting defective component exchanges
US8639915B2 (en)2004-02-182014-01-28Intel CorporationApparatus and method for distributing private keys to an entity with minimal secret, unique information
US20050180572A1 (en)*2004-02-182005-08-18Graunke Gary L.Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US7802085B2 (en)2004-02-182010-09-21Intel CorporationApparatus and method for distributing private keys to an entity with minimal secret, unique information
US20060013402A1 (en)*2004-07-142006-01-19Sutton James A IiMethod of delivering Direct Proof private keys to devices using an on-line service
US7697691B2 (en)*2004-07-142010-04-13Intel CorporationMethod of delivering Direct Proof private keys to devices using an on-line service
US20100150351A1 (en)*2004-07-142010-06-17Sutton Ii James AMethod of Delivering Direct Proof Private Keys to Devices Using an On-Line Service
US8660266B2 (en)*2004-07-142014-02-25Intel CorporationMethod of delivering direct proof private keys to devices using an on-line service
US8924728B2 (en)2004-11-302014-12-30Intel CorporationApparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US20060117181A1 (en)*2004-11-302006-06-01Brickell Ernest FApparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US20070273674A1 (en)*2005-03-182007-11-29Searete Llc, A Limited Liability CorporationMachine-differentiatable identifiers having a commonly accepted meaning
US8014530B2 (en)2006-03-222011-09-06Intel CorporationMethod and apparatus for authenticated, recoverable key distribution with no database secrets
US20080209249A1 (en)*2007-02-272008-08-28Tso Theodore YUse of a UUID as a Time Epoch to Determine if the System Clock Has Been Reset Backwards in Time
US7743271B2 (en)*2007-02-272010-06-22International Business Machines CorporationUse of a UUID as a time epoch to determine if the system clock has been reset backwards in time
US20100157890A1 (en)*2008-12-192010-06-24Robert Bosch GmbhMethod of wireless communication using authentication information
US8576785B2 (en)*2008-12-192013-11-05Robert Bosch GmbhMethod of wireless communication using authentication information
US8539241B2 (en)2009-03-252013-09-17Pacid Technologies, LlcMethod and system for securing communication
US9882883B2 (en)2009-03-252018-01-30Pacid Technologies, LlcMethod and system for securing communication
US11070530B2 (en)2009-03-252021-07-20Pacid Technologies, LlcSystem and method for authenticating users
US10484344B2 (en)2009-03-252019-11-19Pacid Technologies, LlcSystem and method for authenticating users
US8726032B2 (en)2009-03-252014-05-13Pacid Technologies, LlcSystem and method for protecting secrets file
US10320765B2 (en)2009-03-252019-06-11Pacid Technologies, LlcMethod and system for securing communication
US10171433B2 (en)2009-03-252019-01-01Pacid Technologies, LlcSystem and method for authenticating users
US8782408B2 (en)2009-03-252014-07-15Pacid Technologies, LlcMethod and system for securing communication
US10044689B2 (en)2009-03-252018-08-07Pacid Technologies, LlcSystem and method for authenticating users
US9876771B2 (en)2009-03-252018-01-23Pacid Technologies, LlcSystem and method for authenticating users
US20100299529A1 (en)*2009-03-252010-11-25Pacid Technologies, LlcMethod and system for securing communication
US8934625B2 (en)2009-03-252015-01-13Pacid Technologies, LlcMethod and system for securing communication
US8959350B2 (en)2009-03-252015-02-17Pacid Technologies, LlcToken for securing communication
US9009484B2 (en)2009-03-252015-04-14Pacid Technologies, LlcMethod and system for securing communication
US9165153B2 (en)2009-03-252015-10-20Pacid Technologies, LlcSystem and method for protecting secrets file
US9172533B2 (en)2009-03-252015-10-27Pacid Technologies, LlcMethod and system for securing communication
US9407610B2 (en)2009-03-252016-08-02Pacid Technologies, LlcMethod and system for securing communication
US9411972B2 (en)2009-03-252016-08-09Pacid Technologies, LlcSystem and method for creating and protecting secrets for a plurality of groups
US9654451B2 (en)2009-03-252017-05-16Pacid Technologies, LlcMethod and system for securing communication
US9577993B2 (en)2009-03-252017-02-21Pacid Technologies, LlcSystem and method for authenticating users
US20120106733A1 (en)*2010-11-032012-05-03Falch Janet MSystem and method for data encryption
US9443110B2 (en)2011-09-292016-09-13Pacid Technologies, LlcSecure island computing system and method
US8479021B2 (en)2011-09-292013-07-02Pacid Technologies, LlcSecure island computing system and method
US20140236835A1 (en)*2011-09-292014-08-21Pacid Technologies, LlcSystem and method for application security
US10275364B2 (en)2011-09-292019-04-30Pacid Technologies, LlcSecure island computing system and method
US20140136418A1 (en)*2011-09-292014-05-15Pacid Technologies, LlcSystem and method for application security
US8879728B2 (en)2011-12-082014-11-04Dark Matter Labs Inc.Key creation and rotation for data encryption
US8774403B2 (en)2011-12-082014-07-08Dark Matter Labs, Inc.Key creation and rotation for data encryption
US8712044B2 (en)*2012-06-292014-04-29Dark Matter Labs Inc.Key management system
US20230318809A1 (en)*2021-10-192023-10-05Google LlcMulti-key information retrieval
US12244693B2 (en)*2021-10-192025-03-04Google LlcMulti-key information retrieval

Also Published As

Publication numberPublication date
AU2002241778A1 (en)2002-07-30
WO2002058320A1 (en)2002-07-25
US20020064279A1 (en)2002-05-30
WO2002058320A9 (en)2003-09-12

Similar Documents

PublicationPublication DateTitle
US6987853B2 (en)Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess
Halevi et al.Public-key cryptography and password protocols
Bird et al.Systematic design of a family of attack-resistant authentication protocols
US8132020B2 (en)System and method for user authentication with exposed and hidden keys
US5592553A (en)Authentication system using one-time passwords
US5491752A (en)System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens
MironovHash functions: Theory, attacks, and applications
US5995624A (en)Bilateral authentication and information encryption token system and method
Wu et al.Robust smart‐cards‐based user authentication scheme with user anonymity
CN112989426B (en)Authorization authentication method and device, and resource access token acquisition method
US20060195402A1 (en)Secure data transmission using undiscoverable or black data
WO1998045975A9 (en)Bilateral authentication and information encryption token system and method
CN1329418A (en)Method for authenticating network user identity and method for overcoming user password loophole in Kerberous authentication system
JP2003152716A (en) Qualification authentication method using variable authentication information
Davaanaym et al.A ping pong based one-time-passwords authentication system
CN101425925B (en)Method, system and apparatus for providing authentication of data communication
Mishra et al.Authenticated content distribution framework for digital rights management systems with smart card revocation
JP3746919B2 (en) Qualification authentication method using variable authentication information
CN1980127A (en)Command identifying method and command identifying method
Wang et al.Using IC cards to remotely login passwords without verification tables
Lee et al.A study on efficient OTP generation using stream cipher with random digit
JP2005176231A (en)Authentication system and method, certification apparatus and verification apparatus
Bissoli et al.Authentication as a service based on Shamir secret sharing
CN118200005A (en)Anonymous password authentication and encryption scheme for deduplication cloud storage system
CN119211923A (en) A reliable quantum secure access communication method and system

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:VIRTUAL MEDIA, INC., ILLINOIS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:UNER, ERIC R.;REEL/FRAME:011316/0992

Effective date:20001128

ASAssignment

Owner name:BODACION TECHNOLOGIES, LLC, ILLINOIS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VIRTUAL MEDIA, INC.;REEL/FRAME:016836/0579

Effective date:20050802

REMIMaintenance fee reminder mailed
LAPSLapse for failure to pay maintenance fees
STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20100117


[8]ページ先頭

©2009-2025 Movatter.jp